BugTraq Mode:
(Page 113 of 1748)  < Prev  108 109 110 111 112 113 114 115 116 117 118  Next >
CVE-2015-6576: Bamboo - Deserialisation resulting in remote code execution 2015-10-23
David Black (dblack atlassian com)
Note: the current version of this advisory can be found at
https://confluence.atlassian.com/x/Hw7RLg .

CVE ID: CVE-2015-6576
Product: Bamboo.
Affected Bamboo product versions:
* 2.2 <= version < 5.8.5
* 5.9.0 <= version < 5.9.7

Summary:
This advisory discloses a critical severity security vulne

[ more ]  [ reply ]
Re: TeamSpeak Client <= 3.0.18.1 RFI, Directory Traversal to RCE 2015-10-22
scurippio autistici org
Encoding correction :

Exploit Title: "PwnSpeak" a 0day Exploit for TeamSpeak Client <= 3.0.18.1 RFI to RCE
Date: 12/10/2015
Author: Scurippio <scurippio (at) anche (dot) no [email concealed]> / (0x6FB30B11 my pgp keyid)
Vendor Homepage: https://www.teamspeak.com/
Application: TeamSpeak 3
Version: TeamSpeak3 Client 3.0.0 -

[ more ]  [ reply ]
SEC Consult SA-20151022-0 :: Lime Survey Multiple Critical Vulnerabilities 2015-10-22
SEC Consult Vulnerability Lab (research sec-consult com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SEC Consult Vulnerability Lab Security Advisory < 20151022-0 >
=======================================================================
title: Multiple critical vulnerabilities
product: Lime Survey
vulnerable version: 2.05 up t

[ more ]  [ reply ]
Re: TeamSpeak Client <= 3.0.18.1 RFI, Directory Traversal to RCE 2015-10-22
scurippio autistici org
Without encoding error...

Exploit Title: "PwnSpeak" a 0day Exploit for TeamSpeak Client <= 3.0.18.1 RFI to RCE
Date: 12/10/2015
Author: Scurippio <scurippio (at) anche (dot) no [email concealed]> / (0x6FB30B11 my pgp keyid)
Vendor Homepage: https://www.teamspeak.com/
Application: TeamSpeak 3
Version: TeamSpeak3 Client 3.0

[ more ]  [ reply ]
TeamSpeak Client <= 3.0.18.1 RFI, Directory Traversal to RCE 2015-10-22
scurippio autistici org
Exploit Title: "PwnSpeak" a 0day Exploit for TeamSpeak Client <=
3.0.18.1 RFI/ to RCE
Date: 12/⁠⁠10/⁠⁠2015
Author: Scurippio <scurippio (at) anche (dot) no [email concealed]> /⁠⁠ (0x6FB30B11 my pgp keyid)
Vendor Homepage: https://www.teamspeak.com/
Application: TeamSpeak 3
Version: TeamSpeak3 Client 3.0.0 -⁠⁠

[ more ]  [ reply ]
Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015 2015-10-22
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015

Advisory ID: cisco-sa-20151021-ntp

Version 1.0: Interim

For Public Release 2015 October 21 23:00 UTC (GMT)

+---------------------------------------

[ more ]  [ reply ]
APPLE-SA-2015-10-21-8 OS X Server 5.0.15 2015-10-21
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2015-10-21-8 OS X Server 5.0.15

OS X Server 5.0.15 is now available and addresses the following:

BIND
Available for: OS X Yosemite 10.10.5,
OS X El Capitan 10.11.1 or later
Impact: Multiple vulnerabilities in BIND
Description: Multiple v

[ more ]  [ reply ]
APPLE-SA-2015-10-21-7 Xcode 7.1 2015-10-21
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2015-10-21-7 Xcode 7.1

Xcode 7.1 is now available and addresses the following:

Swift
Available for: OS X Yosemite v10.10.5 or later
Impact: Swift programs performing certain type conversions may
receive unexpected values
Description: A t

[ more ]  [ reply ]
APPLE-SA-2015-10-21-6 Mac EFI Security Update 2015-002 2015-10-21
Apple Product Security (product-security-noreply lists apple com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2015-10-21-6 Mac EFI Security Update 2015-002

Mac EFI Security Update 2015-002 is now available and addresses the
following:

EFI
Available for: OS X Mavericks v10.9.5
Impact: An attacker can exercise unused EFI functions
Description: An

[ more ]  [ reply ]
APPLE-SA-2015-10-21-5 iTunes 12.3.1 2015-10-21
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-10-21-5 iTunes 12.3.1

iTunes 12.3.1 is now available and addresses the following:

iTunes
Available for: Windows 7 and later
Impact: A man-in-the-middle attack while browsing the iTunes Store
via iTunes may result in unexpected applic

[ more ]  [ reply ]
APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update 2015-007 2015-10-21
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update
2015-007

OS X El Capitan 10.11.1 and Security Update 2015-007 are now
available and address the following:

Accelerate Framework
Available for: OS X Mavericks v10.9.5, OS X Yosemite v

[ more ]  [ reply ]
APPLE-SA-2015-10-21-3 Safari 9.0.1 2015-10-21
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-10-21-3 Safari 9.0.1

Safari 9.0.1 is now available and addresses the following:

WebKit
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
and OS X El Capitan v10.11
Impact: Visiting a maliciously crafted website may lead

[ more ]  [ reply ]
APPLE-SA-2015-10-21-2 watchOS 2.0.1 2015-10-21
Apple Product Security (product-security-noreply lists apple com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-10-21-2 watchOS 2.0.1

watchOS 2.0.1 is now available and addresses the following:

Apple Pay
Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition,
and Apple Watch Hermes
Impact: Some cards may allow a terminal to retrie

[ more ]  [ reply ]
APPLE-SA-2015-10-21-1 iOS 9.1 2015-10-21
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-10-21-1 iOS 9.1

iOS 9.1 is now available and addresses the following:

Accelerate Framework
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may

[ more ]  [ reply ]
Cisco Security Advisory: Cisco ASA Software VPN ISAKMP Denial of Service Vulnerability 2015-10-21
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software VPN ISAKMP Denial of Service Vulnerability

Advisory ID: cisco-sa-20151021-asa-ike

Revision 1.0

For Public Release 2015 October 21 16:00 UTC (GMT)

+-------------------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability 2015-10-21
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability

Advisory ID: cisco-sa-20151021-asa-dns1

Revision 1.0

For Public Release 2015 October 21 16:00 UTC (GMT)

+-------------------------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Cisco ASA Software DHCPv6 Relay Denial of Service Vulnerability 2015-10-21
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software DHCPv6 Relay Denial of Service Vulnerability

Advisory ID: cisco-sa-20151021-asa-dhcp1

Revision 1.0

For Public Release 2015 October 21 16:00 UTC (GMT)

+---------------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Cisco ASA Software DHCPv6 Relay Denial of Service Vulnerability 2015-10-21
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software DHCPv6 Relay Denial of Service Vulnerability

Advisory ID: cisco-sa-20150115-asa-dhcp

Revision 2.0

For Public Release 2015 January 15 17:54 UTC (GMT)

+----------------------------------------------------

[ more ]  [ reply ]
SiteWIX - (edit_photo2.php id) SQL Injection Exploit 2015-10-21
ZoRLu Bugrahan (zorlu milw00rm com)
#!/usr/bin/env python
#-*- coding:utf-8 -*-

#Title : SiteWIX - (edit_photo2.php id) SQL Injection Exploit
#Author : ZoRLu / zorlu (at) milw00rm (dot) com [email concealed]
#Website : milw00rm.com / milw00rm.net / milw00rm.org / milw0rm.info
#Twitter : https://twitter.com/milw00rm or @milw00rm
#Test : Windows7 Ultimate
#Disc

[ more ]  [ reply ]
[SE-2014-02] Google App Engine Java security sandbox bypasses (Issue 42) 2015-10-21
Security Explorations (contact security-explorations com)

Hello All,

Oracle Critical Patch Update released yesterday incorporates a fix
for a Java SE 7 vulnerability (Issue 42) that was discovered while
investigating security of Google App Engine. Its technical details
and a POC code can be found at the following address:

http://www.security-exploration

[ more ]  [ reply ]
[SECURITY] [DSA 3376-1] chromium-browser security update 2015-10-21
Michael Gilbert (mgilbert debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3376-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Michael Gilbert
October 20, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3375-1] wordpress security update 2015-10-19
Yves-Alexis Perez (corsac debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3375-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Yves-Alexis Perez
October 19, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3374-1] postgresql-9.4 security update 2015-10-19
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3374-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
October 19, 2015

[ more ]  [ reply ]
[SECURITY] [DSA 3373-1] owncloud security update 2015-10-18
Salvatore Bonaccorso (carnil debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-3373-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Salvatore Bonaccorso
October 18, 2015

[ more ]  [ reply ]
ERPSCAN Research Advisory [ERPSCAN-15-017] SAP NetWeaver J2EE DAS service - Unauthorized Access 2015-10-16
ERPScan inc (erpscan online gmail com)
ERPSCAN Research Advisory [ERPSCAN-15-017] SAP NetWeaver J2EE DAS
service - Unauthorized Access

Application: SAP NetWeaver
Versions Affected: SAP NetWeaver AS JAVA, probably others
Vendor URL: http://SAP.com
Bugs: Unauthorized access
Sent: 20.04.2013
Reported: 21.04.2013
Vendor response: 21.04.201

[ more ]  [ reply ]
Events Made Easy WordPress plugin CSRF + Persistent XSS 2015-10-16
David Sopas (davidsopas gmail com)
Plugin link: https://wordpress.org/plugins/events-made-easy/
Active Installs: 10,000+
Version tested: 1.5.49
CVE Reference: Waiting
Original advisory:
https://www.davidsopas.com/events-made-easy-wordpress-plugin-csrf-persis
tent-xss/

Events Made Easy is a full-featured event management solution for

[ more ]  [ reply ]
Qualys Security Advisory - LibreSSL (CVE-2015-5333 and CVE-2015-5334) 2015-10-16
Qualys Security Advisory (qsa qualys com)

Qualys Security Advisory

LibreSSL (CVE-2015-5333 and CVE-2015-5334)

========================================================================

Contents
========================================================================

Summary
Memory Leak (CVE-2015-5333)
Buffer Overflow (CVE-2015-5334)
Ackn

[ more ]  [ reply ]
[ISecAuditors Security Advisories] URL Open Redirect in Google generic TLD and ccTLD 2015-10-15
ISecAuditors Security Advisories (advisories isecauditors com)
=============================================
INTERNET SECURITY AUDITORS ALERT 2015-005
- Original release date: October 5, 2015
- Last revised: October 15th, 2015
- Discovered by: Vicente Aguilera Diaz
- Severity: 2/5
=============================================

I. VULNERABILITY
----------------

[ more ]  [ reply ]
APPLE-SA-2015-10-15-1 Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 2015-10-15
Apple Product Security (product-security-noreply lists apple com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-10-15-1 Keynote 6.6, Pages 5.6, Numbers 3.6, and
iWork for iOS 2.6

Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 are now
available which address the following:

Keynote, Pages, and Numbers
Available for: OS X Yosemite v10

[ more ]  [ reply ]
[security bulletin] HPSBOV03503 rev.1 - HP OpenVMS CSWS_JAVA running Tomcat, Multiple Remote Vulnerabilities 2015-10-15
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04851013

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04851013
Version: 1

HPSBOV03503 r

[ more ]  [ reply ]
(Page 113 of 1748)  < Prev  108 109 110 111 112 113 114 115 116 117 118  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus